News

At a press conference preceding the Chinese sales spree, Alibaba Group's vice chairman JoeTsai was asked how a Trump presidency might affect Alibaba and its e-commerce empire, given that the real estate developer-turned-Republican standard bearer has promised steep tariffs on Chinese-made goods, wh

Alibaba Thinks Outside The China Box

Date:

Aug 12, 2016

Category:

Business

Source:

Wall Street Journal

We acquired the majority control of Lazada in an effort to start to serve local consumers in Southeast Asia, and thats something thats going to be a very important potential market for us, Alibaba Executive Vice Chairman JoeTsai said on a conference call Thursday after the company reported rev

VC JoeTsai added that Alibaba will continue to use its excess cash for new acquisitions and share buyback programs. He also mentioned that the company does not plan to pay dividends for now. The executive stated that its takeovers deals are well-thought in strategic terms, but are usually meant to

Tencent Ceo Pledges More Than $2 Billion To Charity

Date:

Apr 19, 2016

Category:

Business

Source:

CNNMoney

His planned donation appears to be the biggest to be publicly announced in China since Jack Ma and JoeTsai of Alibaba pledged roughly $3 billion worth of share options to two charitable trusts in 2014. But it pales in comparison to Facebook CEO Mark Zuckerberg's declaration in December that he woul

Magic Leap Just Landed An Astounding Amount Of Vc Money

Date:

Feb 02, 2016

Category:

Business

Source:

WIRED

Chinese e-commerce giant Alibaba led the round, and executive vice chairman JoeTsai will take a seat on the companys board. Tsai joins Google CEO Sundar Pichai; both Google and Qualcomm were early investors who also joined the latest round. New investors include Warner Brothers and a slew of finan

We invest in forward-thinking, innovative companies like Magic Leap that are developing leading products and technologies, said JoeTsai, Executive Vice Chairman at Alibaba. We believe Alibaba can both provide support to and learn from such a partner, and we look forward to working with the Magic

Mysterious Magic Leap Lands Mega-Funding Round

Date:

Feb 02, 2016

Source:

Miami Herald

anagement, Magic Leap said Tuesday in a statement. Existing investors Google, which led a previous funding round of $542 million in late 2014,and Qualcomm Ventures also participated. Alibabas executive vice chairman JoeTsai will take a seat on the companys board, joining Google CEO Sundar Pichai.

Alibaba's Strong Earnings Seen As Good News For China's Economy

Date:

Jan 28, 2016

Category:

Business

Source:

Sydney Morning Herald

"The Chinese economy is going through a structural shift to more moderate, but more sustainable, growth," JoeTsai, Alibaba's executive vice chairman, said in a conference call. He added, "it's still one of the fastest-growing economies in the world and we have no reason to think anything different

Alibaba To Pay $266 Million For Hong Kong's 'scmp' Newspaper

Date:

Dec 13, 2015

Category:

Business

Source:

Livemint

In a letter to the newspapers readers following the announcement of the sale, Alibaba executive vice chairman JoeTsai vowed the SCMP would be objective, accurate and fair and have the courage to go against conventional wisdom.

Alibaba To Buy South China Morning Post, In A Move That Mirrors Bezos And The ...

Date:

Dec 11, 2015

Source:

USA TODAY

rning Post is unique because it focuses on coverage of China in the English language. This is a proposition that is in high demand by readers around the world who care to understand the worlds second largest economy, JoeTsai, executive vice chairman of Alibaba Group, said in a statement. Our v

Jpmorgan Vice Chairman Jimmy Lee Dies

Date:

Jun 17, 2015

Source:

Sydney Morning Herald

Lee helped manage Alibaba Group Holding's IPO last September, the largest on record. He built a relationship with Alibaba's co-founders Jack Ma and JoeTsai in a matter of 15 months. During the deal was tasked with arranging meetings between Alibaba management and key investors, people familiar with

rket. In the IPO, Alibaba sold 320 million shares, which makes up approximately 13% of the company. However, Alibaba has yet to see its biggest lock up come to an end. In September this year, co-founders Jack Ma and JoeTsai with investors Softbank and Yahoo will sell their 1.6 billion company shares

Alibaba Says Received U.s. Sec Request For Information

Date:

Feb 13, 2015

Category:

Business

Source:

Fox Business

29, JoeTsai, co-founder and vice chairman of Alibaba, said, We take issue with the results of the [SAIC] report, that they purported to take a sample check of items traded on our site, and concluded that the level of fake products on the site We thought the methodology was unfair, and we are pr

Alibaba Acts On Fake Goods Following Spat With Chinese Regulator

Date:

Jan 31, 2015

Category:

Business

Source:

Hamilton Spectator

That prompted suggestions Alibaba should have told investors. But its vice chair, JoeTsai, said Thursday it was one of many regular meetings rather than a formal investigation.

Alibaba Revenue Up 40 Percent In Q3 But Falls Well Short Of Expectations

Date:

Jan 29, 2015

Category:

Business

Source:

VentureBeat

A number that surpasses the entire population of the United States is now shopping on our platform, said JoeTsai, Alibabas executive vice chairman during an earnings call with reporters and analysts.

Fake Goods Land Alibaba In Hot Water With Regulators

Date:

Jan 29, 2015

Source:

Fortune

We felt we were unfairly attacked by a report that was a sample check of some of the items, Alibaba vice chairman JoeTsai said in an interview this morning on CBNC. We thought the methodology was flawed, we felt the attack was targeted at us specifically, and it was unfair. Over time we hope to

Alibaba Adjusted Profit Tops Estimates, Revenue Disappoints

Date:

Jan 29, 2015

Category:

Business

Source:

ABC News

Addressing the Chinese report In a call with analysts on Thursday, the vice chairman JoeTsai said the company believed the report is flawed and unfairly targeted Alibaba. Some analysts have said Alibaba should have disclosed that meeting in its IPO filing, but Tsai said that the meeting with regula

Alibaba Clash Spotlights China Political Risk For Business

Date:

Jan 29, 2015

Category:

Business

Source:

Bloomberg

dministration for Industry and Commerce
accused Alibaba of failing to crack down on shady merchants,
bribery and fake goods, charges the company has rebutted. Co-founder JoeTsai even opened an earnings call Thursday with a
full-on barrage at the regulator, saying he was deeply
troubled by its actions.

What Happens When A Chinese Tycoon Stands Up Against The Government ...

Date:

Jan 29, 2015

Category:

Business

Source:

Forbes

removing the White Paper from its website and Alibaba taking down the initial rebuff directed at the minister. Yet this gesture doesnt mean Alibaba is giving in during the earnings call on Thursday, executive vice chairman JoeTsai said that the company was preparing to file a formal complaint. Ali

The key thing you are seeing is the unleashing of the consumption power of the chinese consumers, said JoeTsai, the executive vice chairman of Alibaba Group at a media briefing today. China has been an economy thats driven by exports and investments. We are really seeing the shift of the econom

Publications

US Patents

Authenticated Diffie-Hellman Key Agreement Protocol Where The Communicating Parties Share A Secret Key With A Third Party

The present invention provides a method and system for performing an authenticated Diffie-Hellman key agreement protocol over a network where the communicating parties share a secret key with a third party. In one embodiment, the network is a wireless network, wherein a wireless client electronic system (WC) and a network access point electronic system (AP) are the parties executing the authenticated Diffie-Hellman key agreement protocol. In this embodiment, the WC and the AP exchange a shared secret key for encrypting wireless communications between the wireless client electronic system and the network access point electronic system. In one embodiment, the WC shares a first secret key with a RADIUS server of the network. Similarly, the AP shares a second secret key with the RADIUS server of the network. The first and second secret keys are utilized for performing an authentication protocol.

Claim:

What is claimed is: 1. A method of performing an authenticated Diffie-Hellman key agreement protocol over a network between a first communicator sharing a first secret key with an authentication resource (AR) and a second communicator sharing a second secret key with said AR, said method comprising the steps of: a) generating a first message authentication code (MAC) of a first variable using said first secret key for said first communicator; b) generating a second MAC of a second variable using said second secret key for said second communicator; c) transmitting over said network to said AR said first variable, said second variable, a first identifier corresponding to said first communicator, a second identifier corresponding to said second communicator, said first MAC, and said second MAC, wherein said AR is configured for determining a secret key corresponding to an identifier transmitted over said network; d) generating a third MAC of said first variable using said first secret key determined by said AR from said first identifier and a fourth MAC of said second variable using said second secret key determined by said AR from said second identifier; e) if said first MAC matches said third MAC and said second MAC matches said fourth MAC, generating a fifth MAC of said second variable using said second secret key determined by said AR from said second identifier and a sixth MAC of said first variable using said first secret key determined by said AR from said first identifier; f) transmitting over said network to said second communicator said fifth MAC, said first variable, said second variable, and said first identifier; g) generating a seventh MAC of said second variable using said second secret key for said second communicator; h) transmitting over said network to said first communicator said sixth MAC, said first variable, said second variable, and said second identifier; i) generating an eighth MAC of said first variable using said first secret key for said first communicator; and j) if said fifth MAC matches said seventh MAC and said sixth MAC matches said eighth MAC, generating a shared secret key based on said first variable for said second communicator and said shared secret key based on said second variable for said first communicator, wherein said shared secret key facilitates encrypted communication between said first communicator and said second communicator. 2. A method as recited in claim 1 wherein said first variable is generated based on a first random number generated by said first communicator. 3. A method as recited in claim 1 wherein said second variable is generated based on a second random number generated by said second communicator. 4.

A process for mutual authentication of users and networks over an unsecured wireless communication channel. In one embodiment, sensitive information (e. g. , passwords) is not communicated over the unsecured channel. Rather, hashed representations of user identifiers, passwords, etc. , and randomly generated numbers are communicated between the client and the network during the log-in process. The representations may be encrypted with a one-way hash function such that it is not computationally feasible for an eavesdropper to decrypt. In one embodiment, the representation may be generated based on the user identifier, password and/or MAC address of a wireless LAN card.

Using A Key Lease In A Secondary Authentication Protocol After A Primary Authentication Protocol Has Been Performed

The present invention provides a method and system for using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed. In one embodiment, the primary authentication protocol comprises a strong, secure, computationally complex authentication protocol. Moreover, the secondary authentication protocol comprises a less complex (compared to the primary authentication protocol) and less secure (compared to the primary authentication protocol) authentication protocol which can be performed in a length of time that is shorter than a length of time required to perform the primary authentication protocol. In one embodiment, a wireless client electronic system (WC) completes the primary authentication protocol with a wireless network access point electronic system of a wireless network (AP). When the WC is required to authenticate with another AP, the WC authenticates itself with another AP by using the secondary authentication protocol. However, the WC is required to periodically complete the primary authentication protocol, guarding against the possibility that the secondary authentication protocol may be exploited by an unauthorized intruder to attack the wireless network.